tag:blogger.com,1999:blog-862728556654140629.post4265002872035957546..comments2019-09-11T09:22:07.002-07:00Comments on WASEIAN: Network Security - MCQSWaseianhttp://www.blogger.com/profile/05476911949495101086noreply@blogger.comBlogger46125tag:blogger.com,1999:blog-862728556654140629.post-14557240279516148032019-07-02T23:35:26.596-07:002019-07-02T23:35:26.596-07:00but it is possible to host multiple web domains un...but it is possible to host multiple web domains under same IP addressUnknownhttps://www.blogger.com/profile/00801083498162648257noreply@blogger.comtag:blogger.com,1999:blog-862728556654140629.post-53486378270797525052019-07-02T09:56:43.910-07:002019-07-02T09:56:43.910-07:00Sharing link is prohibited. Please avoid.Sharing link is prohibited. Please avoid.Waseianhttps://www.blogger.com/profile/18063139110908699048noreply@blogger.comtag:blogger.com,1999:blog-862728556654140629.post-8098121836043572292019-07-02T09:55:34.008-07:002019-07-02T09:55:34.008-07:00I believe, this is wrong. I believe, this is wrong. Waseianhttps://www.blogger.com/profile/18063139110908699048noreply@blogger.comtag:blogger.com,1999:blog-862728556654140629.post-38610383498468301262019-07-02T06:42:24.694-07:002019-07-02T06:42:24.694-07:00Secure Hash cannot be reversed, but a secure ciphe...Secure Hash cannot be reversed, but a secure cipher can be.Amitavahttps://www.blogger.com/profile/17613019728123367802noreply@blogger.comtag:blogger.com,1999:blog-862728556654140629.post-36098499750703087382019-07-02T06:39:55.508-07:002019-07-02T06:39:55.508-07:00https mandates IP address tied to SSL certificates...https mandates IP address tied to SSL certificatesAmitavahttps://www.blogger.com/profile/17613019728123367802noreply@blogger.comtag:blogger.com,1999:blog-862728556654140629.post-2966857531839348642019-07-02T01:40:10.432-07:002019-07-02T01:40:10.432-07:00B(not sure though.....hash is usually different fo...B(not sure though.....hash is usually different for different message)Himanshu Singhhttps://www.blogger.com/profile/03170497505218213183noreply@blogger.comtag:blogger.com,1999:blog-862728556654140629.post-22045690473139149222019-06-29T08:57:25.666-07:002019-06-29T08:57:25.666-07:00SMTP has a mechanism to enable TLS mode to enforce...SMTP has a mechanism to enable TLS mode to enforce security.<br />Unknownhttps://www.blogger.com/profile/12687746672757682589noreply@blogger.comtag:blogger.com,1999:blog-862728556654140629.post-17756665301905547842019-06-29T08:51:26.376-07:002019-06-29T08:51:26.376-07:00Content-type: image/gif
Content-Disposition: attac...Content-type: image/gif<br />Content-Disposition: attachment; filename=&quot;star.gif&quot;<br />Unknownhttps://www.blogger.com/profile/12687746672757682589noreply@blogger.comtag:blogger.com,1999:blog-862728556654140629.post-5706035705187910872019-06-29T08:37:49.126-07:002019-06-29T08:37:49.126-07:00a. if database admin knows the key, there is no se...a. if database admin knows the key, there is no security<br />Unknownhttps://www.blogger.com/profile/12687746672757682589noreply@blogger.comtag:blogger.com,1999:blog-862728556654140629.post-50446712962531903542019-06-29T08:37:23.226-07:002019-06-29T08:37:23.226-07:00encrpytion is done but trust is lost
encrpytion is done but trust is lost<br />Unknownhttps://www.blogger.com/profile/12687746672757682589noreply@blogger.comtag:blogger.com,1999:blog-862728556654140629.post-40850967944691887882019-06-29T08:36:47.175-07:002019-06-29T08:36:47.175-07:00C. is encryption of the plaintext by sender using ...C. is encryption of the plaintext by sender using the <br /> elliptic curve private key of the receiver.<br />Unknownhttps://www.blogger.com/profile/12687746672757682589noreply@blogger.comtag:blogger.com,1999:blog-862728556654140629.post-75012056255113159522019-06-29T06:44:28.018-07:002019-06-29T06:44:28.018-07:00Why is it not possible to host multiple web domain...Why is it not possible to host multiple web domains under<br /><br /> the same IP address in https?<br /><br /><br />Select one:<br />a. It is very much possible by using load balancer<br />b. It is very much possible if https uses SNI option<br />c. https mandates IP address tied to SSL certificates<br />d. IP addresses are verified in https<br />Aruphttps://www.blogger.com/profile/02046003689087126124noreply@blogger.comtag:blogger.com,1999:blog-862728556654140629.post-14832775496024630792019-06-29T06:44:18.796-07:002019-06-29T06:44:18.796-07:00Pick which statement is true.
Elliptic curve -Di...Pick which statement is true.<br /><br /> Elliptic curve -Digital Signature generation...<br /><br /><br />Select one:<br />A. is encryption of the plaintext by sender using the <br /> elliptic curve private key of the receiver.<br />B. encrypts the plaintext and produces a signature<br /> such that the plaintext is confidential. <br />C. is encryption of the plaintext by sender using the <br /> elliptic curve public key of the receiver<br />D. provides data integrity for plaintext<br />Aruphttps://www.blogger.com/profile/02046003689087126124noreply@blogger.comtag:blogger.com,1999:blog-862728556654140629.post-52297453501925129462019-06-29T06:44:05.891-07:002019-06-29T06:44:05.891-07:00Pick which statement is true.
Select one:
a. Bot...Pick which statement is true.<br /><br /><br />Select one:<br />a. Both Secure Hash and secure cipher can be reversed, but only in the case of hash the output size is fixed.<br />b. Secure Hash cannot be reversed, but a secure cipher can be.<br />c. Secure Hash can be reversed, but a secure cipher cannot<br />d. Both Secure Hash and secure cipher cannot be reversed, but only in the case of hash the output size is fixed.<br />Aruphttps://www.blogger.com/profile/02046003689087126124noreply@blogger.comtag:blogger.com,1999:blog-862728556654140629.post-10387418721217898312019-06-29T06:43:52.711-07:002019-06-29T06:43:52.711-07:00Consider (a ^ n) mod p = 1, and pick which of the ...Consider (a ^ n) mod p = 1, and pick which of the following is true.<br /><br /><br />Select one:<br />A. If and only if p is prime, n = p-1 <br />B. If n = p-1, it implies that p is prime.<br />C. If p is not prime and a and p are co-prime, then n=p-1<br />D. If p is prime, then n=p-1<br />Aruphttps://www.blogger.com/profile/02046003689087126124noreply@blogger.comtag:blogger.com,1999:blog-862728556654140629.post-53327510712633904362019-06-29T06:43:42.254-07:002019-06-29T06:43:42.254-07:00I gave two hashes to my friend :
H1 = MD5...I gave two hashes to my friend : <br /><br /> H1 = MD5(my password)<br /><br /> H2 = MD5(reverse of my password)<br /><br /> The next day he was able to tell my password. <br /><br /> What do I infer from this exercise?<br /><br /><br />Select one:<br />a. My password did not contain special characters<br />b. My password was too weak and guessable<br />c. Revealing the reverse hash of the password<br /> is enough to figure out the password<br />d. MD5 is weak and can be cracked<br />Aruphttps://www.blogger.com/profile/02046003689087126124noreply@blogger.comtag:blogger.com,1999:blog-862728556654140629.post-68089202044745537842019-06-29T06:43:31.676-07:002019-06-29T06:43:31.676-07:00Consider Hashed Message Authentication Code (HMAC)...Consider Hashed Message Authentication Code (HMAC) scheme.<br /><br /> Pick which statement is true.<br /><br /><br />Select one:<br />A. HMAC output size depends on the hashing tool chosen<br />B. HMAC output depends on the size of the input message<br />C. HMAC output size is same as the input key size<br />D. HMAC output size is not fixed<br />Aruphttps://www.blogger.com/profile/02046003689087126124noreply@blogger.comtag:blogger.com,1999:blog-862728556654140629.post-91217185408027441982019-06-29T06:43:21.665-07:002019-06-29T06:43:21.665-07:00Instead of storing plaintext passwords, AES encryp...Instead of storing plaintext passwords, AES encrypted passwords are stored in database.<br /><br /> In such a system, Which of these statements is true ?<br /><br /><br />Select one:<br />a. even if database admin knows the key, original passwords cannot get revealed.<br />b. if database admin knows the key, there is no security<br />c. Password Authentication becomes slow<br />d. Changing passwords will not be possible<br />Aruphttps://www.blogger.com/profile/02046003689087126124noreply@blogger.comtag:blogger.com,1999:blog-862728556654140629.post-21043797961053646612019-06-29T06:42:59.719-07:002019-06-29T06:42:59.719-07:00Pick the valid MIME header, when sending an image ...Pick the valid MIME header, when sending an image in email.<br /><br /><br />Select one:<br />A. Content-type: image/gif/jpeg/jpg; name=&quot;star.gif&quot;<br />Content-Disposition: attachment; filename=&quot;star.gif&quot;<br />B. Content-type: image/gif; name=&quot;star.gif&quot;<br />Content-Disposition: base64; filename=&quot;star.gif&quot;<br />C. Content-type: image/gif<br />Content-Disposition: attachment; filename=&quot;star.gif&quot;<br />D. Content-type: image/gif; name=&quot;star.gif&quot;<br />Content-Disposition: image; filename=&quot;star.gif&quot;<br />Aruphttps://www.blogger.com/profile/02046003689087126124noreply@blogger.comtag:blogger.com,1999:blog-862728556654140629.post-36850060624360801842019-06-29T06:42:38.231-07:002019-06-29T06:42:38.231-07:00Which of these statements is true?
Select one:
a. ...Which of these statements is true?<br />Select one:<br />a. If TLS mode in SMTP is set forwarding will fail<br />b. Email mandates use of IMAP so that security is enforced<br />c. SMTP has a mechanism to enable TLS mode to enforce security.<br />d. IMAP provides security, but is optional in email <br />Aruphttps://www.blogger.com/profile/02046003689087126124noreply@blogger.comtag:blogger.com,1999:blog-862728556654140629.post-36885962759600305962019-06-29T06:42:14.993-07:002019-06-29T06:42:14.993-07:00Which of these DNS records are used for SPAM filte...Which of these DNS records are used for SPAM filtering?<br /><br /><br />Select one:<br />A. MX and SPF<br />B. A and MX<br />C. PTR and SPF<br />D. A, MX and SPF<br />Aruphttps://www.blogger.com/profile/02046003689087126124noreply@blogger.comtag:blogger.com,1999:blog-862728556654140629.post-12636687403831049732019-06-29T06:41:54.284-07:002019-06-29T06:41:54.284-07:00Which of these statements is true ?
In HTTPS, ...Which of these statements is true ?<br /><br /> In HTTPS, if SSL certificate is self-signed<br /><br /><br />Select one:<br />a. encrpytion is done but can be cracked<br />b. Only HTTP payload is encrypted<br />c. encryption is not done<br />d. encrpytion is done but trust is lost<br />Aruphttps://www.blogger.com/profile/02046003689087126124noreply@blogger.comtag:blogger.com,1999:blog-862728556654140629.post-9871615824707255042019-05-06T08:34:03.936-07:002019-05-06T08:34:03.936-07:00D. P2,P1,P3,P4D. P2,P1,P3,P4Unknownhttps://www.blogger.com/profile/06175059842060227519noreply@blogger.comtag:blogger.com,1999:blog-862728556654140629.post-90031304604969832752019-05-06T07:43:04.705-07:002019-05-06T07:43:04.705-07:00Describe the answer please? Describe the answer please? Amolhttps://www.blogger.com/profile/12596159138007584595noreply@blogger.comtag:blogger.com,1999:blog-862728556654140629.post-74819873200482713392019-05-06T04:53:23.925-07:002019-05-06T04:53:23.925-07:00I - me@gmail.com - tried to email a .jar file to D...I - me@gmail.com - tried to email a .jar file to Dinesh. dinesh@company.com . But it got blocked by gmail while attaching.Then I tried sending a .txt file to Dinesh which went through fine. What do you infer? .jar files cannot be sent as <br /><br /><br />Select one:<br />A. it is blocked by gmail as it could contain viruses.<br />B. it is blocked by gmail as .jar files are bigger in size<br />C. it is blocked by company.com<br />D. Email uses SMTP which is a Text protocolUnknownhttps://www.blogger.com/profile/13559219558255588480noreply@blogger.com